Towards improving the security of image steganography via minimizing the spatial embedding impact

被引:5
作者
Su, Wenkang [1 ]
Ni, Jiangqun [1 ,2 ]
Hu, Xianglei [3 ]
Huang, Fangjun [4 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[3] Guangdong Polytech Normal Univ, Sch Comp Sci, Guangzhou, Peoples R China
[4] Sun Yat Sen Univ, Sch Cyber Sci & Technol, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Information hiding; Image steganography; Spatial embedding impact; Non -additive distortion; ADAPTIVE STEGANOGRAPHY; STEGANALYSIS;
D O I
10.1016/j.dsp.2022.103758
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous advances in computer technology and electronics, image steganography, an important branch of information hiding aimed at hiding secret information in innocent digital images for covert communication, has also been developed significantly in recent years. Recent studies on image steganography have shown that non-additive distortion steganography schemes, e.g., Synch, CMD and Dejoin-J, can improve the security of additive steganographic distortion functions. These schemes are basically designed based on some heuristic experiences, whose essence can be attributed to implicitly reducing the spatial embedding impact. In view this, we develop a general Intra-block Modification Optimization (IbMO) strategy to improve the security of both spatial and JPEG image steganography via directly minimizing the spatial embedding impact, wherein the metric for spatial embedding impact is explicitly defined as the summation of absolute difference of noise residuals between cover and stego image. Note that, to apply it to JPEG image steganography, the IbMO strategy will be integrated into a newly proposed BBC-based Intra-block Joint Modification (IbJM) scheme with five-element crossing neighborhood. Experimental results indicate that the proposed IbMO strategy can obviously improve the security performances of additive distortion steganography schemes. Specifically, the IbMO strategy significantly outperforms Synch and rivals CMD on HiLL and MiPOD. The newly proposed IbJM scheme also shows better overall performance with less computational overhead than DeJoin-J on JUNIWARD, GUED, and BET, and its security performance can be further improved after integration with IbMO strategy.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 38 条
[31]   New design paradigm of distortion cost function for efficient JPEG steganography [J].
Su, Wenkang ;
Ni, Jiangqun ;
Hu, Xianglei ;
Huang, Jiwu .
SIGNAL PROCESSING, 2022, 190
[32]   A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy [J].
Su, Wenkang ;
Ni, Jiangqun ;
Li, Xiaohan ;
Shi, Yun-Qing .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (12) :3545-3549
[33]   Automatic Steganographic Distortion Learning Using a Generative Adversarial Network [J].
Tang, Weixuan ;
Tan, Shunquan ;
Li, Bin ;
Huang, Jiwu .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (10) :1547-1551
[34]   Partial reversible AMBTC-based secret image sharing with steganography [J].
Wu, Xiaotian ;
Yang, Ching-Nung .
DIGITAL SIGNAL PROCESSING, 2019, 93 :22-33
[35]   Efficient watermarking algorithm for digital audio/speech signal [J].
Yamni, M. ;
Karmouni, H. ;
Sayyouri, M. ;
Qjidaa, H. .
DIGITAL SIGNAL PROCESSING, 2022, 120
[36]   Decomposing Joint Distortion for Adaptive Steganography [J].
Zhang, Weiming ;
Zhang, Zhuo ;
Zhang, Lili ;
Li, Hanyi ;
Yu, Nenghai .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2017, 27 (10) :2274-2280
[37]   Image robust adaptive steganography adapted to lossy channels in open social networks [J].
Zhang, Yi ;
Luo, Xiangyang ;
Wang, Jinwei ;
Guo, Yanqing ;
Liu, Fenlin .
INFORMATION SCIENCES, 2021, 564 :306-326
[38]   Destroying robust steganography in online social networks [J].
Zhu, Zhiying ;
Li, Sheng ;
Qian, Zhenxing ;
Zhang, Xinpeng .
INFORMATION SCIENCES, 2021, 581 :605-619